[Nsi-wg] Security attributes

John MacAuley john.macauley at surfnet.nl
Tue Apr 5 22:15:55 CDT 2011


Of course we need to clearly distinguish the differences between transport level security provided by a specific implementation instance, and these someone undefined security securityAttr we have stuffed into the CS protocol specification (and in the XSD).

From an implementation instance we will use TLS mutual authentication using provisioned digital certificates to set up an encrypted trust relationship between a pair of servers, and basic user ID and passwords to identify the NSA issuing requests.

I am still interested in examples of the securityAttr associated with the common parameters and NSATypes.

I would like to make sure we use the existing tns:AttributeSequenceType definition for type/value pairs instead of a specific definition every time we get another field we think is special.  For example, SecurityType == attributeName and Security Credentials == attributeValue.  Simple reuse and no confusion.

John

On 2011-03-31, at 6:53 AM, Jerry Sobieski wrote:

> I think it is up to the network and not a standards issue which authentication mech a service uses.   IMO The standards issue is a) what authentication mechs this protocol is required to recognize and b) how that authenticated user is used in an authorization context. 
> 
> We have not formally defined NSI authorization context.   We need to do this so that we clearly define what objects and processes are subject to authorization.  Eg what authorization is required to access RA connection info vs PA connection info?  We've argued a bit about this, but have no formal NSI AA context/environment defined. 
> 
> I suggest we provide a very basic AA context for v1.   This is not weak security, just very simple roles and policy.   I will draft a 1ish page AA Policy context section for review and discussion.  This will bound what v1 requires. 
> 
> J
> 
> 
> Sent from my iPhone
> 
> On Mar 31, 2011, at 3:38 AM, Inder Monga <imonga at es.net> wrote:
> 
>> I would prefer to have the lower level security for protocol development purposes only, otherwise it gets selected by default in deployment. Is that possible while meeting the objectives of simple security?
>> 
>> Inder
>> 
>> 
>>> 
>>> <postbox-contact.jpg>	Jerry Sobieski
>>> March 30, 2011 10:01 AM
>>> 
>>> I propose the following high level approach for V1:
>>> 
>>> We have defined two levels of AA: "Session layer" between NSAs, and 
>>> "Request layer" at the primitive/connection context.
>>> 
>>> I pose we define a "security attributes" element that consists of:
>>> a) Security Type := Identifies the security mechanism this element 
>>> provides.
>>> b) Secutity Credentials := Contains a string of security 
>>> information to be interpreted by the mechanism specified in the Type field.
>>> 
>>> When initializing the NSA to NSA session, this element will authenticate 
>>> each NSA to the other, and then each NSA will decide whether the other 
>>> [remote] NSA is authorized to communicate with the local NSA.
>>> 
>>> For any service request, the request must be authorized. The Service 
>>> Definition will specify the set of recognized and allowable AA 
>>> mechanisms for each network. The user request must specify one 
>>> allowable mechanism in the service request.
>>> 
>>> Initially, the NSI CS spec will require NSAs to recognize and support 
>>> two levels of security:
>>> a) "simple security" consisting of a string passed to the 
>>> authorizing agent for lookup in a flat text file,
>>> b) "better security" a more sophisticated AA scheme such as X509 
>>> or the like (details TBD by someone who understands these issues in 
>>> greater detail.)
>>> 
>>> I will code this into the XSD for the Service Defs. Any comments or 
>>> additional necessary detail, please let me know.
>>> 
>>> 
>>> Jerry
>>> _______________________________________________
>>> nsi-wg mailing list
>>> nsi-wg at ogf.org
>>> http://www.ogf.org/mailman/listinfo/nsi-wg
> _______________________________________________
> nsi-wg mailing list
> nsi-wg at ogf.org
> http://www.ogf.org/mailman/listinfo/nsi-wg

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.ogf.org/pipermail/nsi-wg/attachments/20110405/98bcf607/attachment.html 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1791 bytes
Desc: not available
Url : http://www.ogf.org/pipermail/nsi-wg/attachments/20110405/98bcf607/attachment.bin 


More information about the nsi-wg mailing list